Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Max Taylor is active.

Publication


Featured researches published by Max Taylor.


Cyberpsychology, Behavior, and Social Networking | 2003

Model of Problematic Internet Use in People with a Sexual Interest in Children

Ethel Quayle; Max Taylor

Agencies working with sex offenders are starting to see the emergence of people with a sexual interest in children who meet some of their needs through the use of child pornography, or the seduction of children, through the Internet. While CBT models dominate our understanding of sex offenders, there has been little research into the role that such new technologies may play in offending behavior. Data from the COPINE project has been used to generate a model of such offending behavior that emphasizes the role of cognitions in both the etiology, engagement with and problematic use of the Internet for those with a sexual interest in children. Such a model seeks to incorporate contemporary thinking about the role of cognitions in Pathological Internet Use, but applies this from a nonpathological perspective. This model is a first step towards providing a conceptual framework for such offending that will help inform both assessment and therapy.


Terrorism and Political Violence | 2006

A Conceptual Framework for Addressing Psychological Process in the Development of the Terrorist

Max Taylor; John Horgan

A conceptual framework is presented for addressing psychological issues in the development of the terrorist. In particular, the authors suggest that viewing terrorism as a process may lead not only to better conceptual development in analyses of the terrorist, but may also lead to the development of more practical and efficient counterterrorism initiatives. Additionally, viewing terrorism in this way may finally lead to the formation of a clear and unambiguous position for psychology within an interdisciplinary approach to analyses of both terrorism and the terrorist.


Cyberpsychology, Behavior, and Social Networking | 2001

Child Seduction and Self-Representation on the Internet

Ethel Quayle; Max Taylor

This paper presents a case study of a man charged with the offense of downloading child pornography from the Internet. He had used the Internet to traffic child pornography, and, in addition, to locate children to abuse, to engage in inappropriate sexual communication with children, and to communicate with other pedophiles. Such offenses were facilitated by self-representing in Chat rooms as both a child and an adult. The case study illustrates how such offenders move through a repertoire of offending behavior and discusses the role that the Internet can play in supporting inappropriate and disinhibited sexual behavior that victimizes children through the trading of child pornography and possible child seduction. The Internet is seen to play a unique role in allowing individuals to self-represent aspects that might otherwise remain hidden or dormant.


Journal of Sexual Aggression | 2000

The internet and offending behaviour: A case study

Ethel Quayle; G. Holland; Carol Linehan; Max Taylor

Abstract Summary: The COPINE Project at the Department of Applied Psychology, seeks to address childrens vulnerability in relation to the Internet and child pornography. As part of the project, offenders convicted of downloading such images have been interviewed. This paper considers existing models of offender behaviour alongside literature relating to Internet use. A single case study is used to illustrate a process-focused model of offending, using interview material to demonstrate how the offender represented and accounted for his behaviour. The offender in question had no history of engaging in sexual behaviour with actual children, but his case illustrated many of the stages described by offenders in their involvement with pornography, including: setting events, engagement, collecting behaviour, and the emergence of relationships.


Information Security Technical Report | 2011

Social networking as a nexus for engagement and exploitation of young people

Ethel Quayle; Max Taylor

This paper addresses commonalities between two different forms of exploitation of young people - child abuse images and online solicitation and radicalisation. A number of areas of similarity are identified, and the implications of these commonalities are discussed. The role of social networking as a critical factor is particularly explored.


Irish Journal of Psychology | 2008

Criminogenic qualities of the Internet in the collection and distribution of abuse images of children

Max Taylor; Ethel Quayle

This paper explores ways in which the Internet itself might be thought to contribute to the commission of criminal behaviour, such as the trade in abuse images of children. In doing so, it identifies a number of characteristics or qualities of the Internet that might be thought to facilitate the commission of criminal acts. The discussion is framed within a conceptual framework informed by the rational choice perspective on offending, focusing on the environmental contraints and qualities of the Internet. It identifies, in particular, search activities as being a central rate limiting activity in Internet crime. The paper also explores how this analysis might aid the development of preventative strategies.


Terrorism and Political Violence | 2013

“Terroristic Content”: Towards a Grading Scale

Donald Holbrook; Gilbert Ramsay; Max Taylor

In this article we offer a first attempt at providing a set of universal grading criteria for determining on what basis, and how far, an item of discursive content can be considered “terroristic.” In doing so, we draw loosely on the existing COPINE scale for child abuse images. The scale described in the article is not intended to reflect actual risk of engagement in terrorist violence, nor is it intended to have evidential validity in relation to offenses in certain jurisdictions relating to “terrorist publications.” Rather, by formalising assumptions which seem already to be latent in the literature on terrorist use of the Internet, it aspires to serve as a starting point for a more methodologically coherent approach to relationships between content—particularly online content—and terrorism.


Studies in Conflict & Terrorism | 2010

Financial Intelligence: A Price Worth Paying?

Marc Parker; Max Taylor

The harvesting of financial intelligence by law enforcement and intelligence services through various forms of surveillance is now so prevalent that it has become a core feature of contemporary security practice. Not surprisingly, concerns have been raised regarding the intrusive nature of financial intelligence collection and the emerging challenges posed to liberty. This article, whilst written primarily from a UK perspective, considers the trade-offs that inevitably emerge when liberty and security collide. Above all it argues that such measures are a necessary consequence of a changing security environment and that effective counter measures inevitably come at a price. The value added from data surveillance by the state, when lawfully sanctioned, audited and regulated are in the interests of public safety and national security, deemed a price worth paying.


Journal of policing, intelligence and counter terrorism | 2014

Developing grading processes for ideological content

Donald Holbrook; Max Taylor

This article focuses on the development and application of methodological tools to measure and to “grade” the content of ideological material seen to promote violence and extremism. Our premise is that variation in such content suggests that the formulation of a substantive grading tool will provide analysts with an empirical foundation to detect the nature of these differences and highlight important distinctions. The paper argues that such an approach will offer ways in which to construct an evidence-based picture of what constitutes different layers of extremist fringes, as well as understanding how and when output from particular sources has changed over time. Initial shortcuts to understanding content, it is argued, fail to reflect these nuances, thus necessitating a more systematic approach. The paper develops a two-pronged approach to grading ideological material, presenting examples of Islamist extremist discourse to illustrate how the process might work in practice.


Information Security Technical Report | 2012

Corrigendum to Social networking as a nexus for engagement and exploitation of young people [Inform Secur Tech Rep 16 (2) (2011) 44-50]

Ethel Quayle; Max Taylor

DOI of original article: 10.1016/j.istr.2011.09.006. * Corresponding author. E-mail address: [email protected] (E. Quayle). 1363-4127/

Collaboration


Dive into the Max Taylor's collaboration.

Top Co-Authors

Avatar

Ethel Quayle

University of Edinburgh

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Gilbert Ramsay

University of St Andrews

View shared research outputs
Top Co-Authors

Avatar

John Horgan

University of St Andrews

View shared research outputs
Top Co-Authors

Avatar

Marc Parker

University of St Andrews

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge